HCRG Workforce Solutions
HCRG’s Workforce Solution operates using cloud based platforms and provide an end–to-end workforce solution for the coordination and management of your flexible workforces. Our service allows for the direct engagement of flexible resource pools, talent pooling, and provides analytical tools to drive increased efficiencies.
Features
- End-to-end recruitment technology & supporting managed service
- Specialist Healthcare worker on boarding module
- Integrated time & expense module
- End to End Procure to Pay Solution
- Bespoke management information suite
- Programme & account management
- Outsourced Bank Management
- E-rostering technology
- RPO- recruitment process outsourcing
- Consultancy Service
Benefits
- Allow clients to directly engage their workforce for all staffing
- Provide real time reporting allowing clients to manage their resource
- Integrate with e-rostering, bank modules, ESR, payroll and accounts payable
- Delivery of efficiencies and reduction in workloads
- Live tracking of financial data and expenditure of flexible workforce
- Allows flexibility to adapt to changing demand and market conditions
- Large-scale savings, rate reductions, cost management & efficiency gains
- 24/7 service with dedicated account staff and specialist consultants
Pricing
£1.00 to £10.00 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 8 3 2 1 8 3 2 4 6 3 4 7 1 8
Contact
HCRG WORKFORCE SOLUTIONS LIMITED
Gary Taylor
Telephone: 020 7451 1451
Email: tenders@hcrg.uk.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No there are no plans that may cause constraints to software use by Buyers. We maintain 99.9% uptime and with all planned maintenance notified in advance to Buyers, and completed in downtime periods.
- System requirements
-
- We fully scope all software requirements with Buyers.
- Buyers can influence system requirements and data-flows.
- Buyers only require access to the internet to utilise software.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Acknowledgement - within 2 working hours
Low level issues/support - within 24 working hours
Medium level issues/support - within 48 working hours
Technical level issues - within 14 working days - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Each Customer is allocated their own dedicated Account Management Team to provide on-site and remote support. The AMT act as first line contact/support for queries and day to day running of services/systems. The AMT are fully supported by technical teams for 2nd line queries and support.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Our dedicated Account Management Team will be based on-site and will start a very detailed Implementation scoping and planning exercise. This will address all aspects of Design & Configuration. Full support throughout the entirety of the project, mixed on-site and remote, will be provided by the Account Management team. Full training is delivered on-site to all users and as relevant to their role, and follows with additional online / refresh training.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Our Account Management Team will discuss with the Customer a fully detailed exit plan, including system/data/service transition in-house or to an alternative provider. In terms of data extracts, all data can be exported securely from the system and in any format requested by the Customer.
- End-of-contract process
-
Upon receipt of notice to terminate from a Customer, our Account Management Team will arrange a review meeting, during which our exit will be discussed, minutes recorded, and an Exit Plan developed, shared and agreed with the Customer (including key actions, involved persons, timelines and check/review points) - similar to an implementation plan in reverse.
The exit plan will be delivered over a 12 week period, unless a shorter period is defined by the Customer, and with agreed KPIs for each stage. After 12 weeks any additional services will be charged at the rate agreed during the initial Exit Meeting.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are no differences and 100% functionality of the service is available via any smart and web enabled device with access to a WI-FI connection. Where a mobile is used, and off WI-FI (i.e. via mobile data or no connection), actions complete upon connectivity to WI-FI being available.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- 100% of all functionality is available via the system from any web enabled smart device and with a Wi-Fi connection. Users are issued with a unique login and password to gain initial access to the system, and which following 1st login prompts an immediate password change by the user to progress further into the system. All functionalities of the system, including configurations and development activities, are web based and with user permission levels linked to user access and to distinguish rights between users (and access to data/information).
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- All interface testing completed is compliant to EN 301 549 9 standards, and covers testing of various users with multiple needs and with the system capable of interfacing with all current and known software and accessibility readers to ensure maximum engagement and use by those with registered/unregistered disabilities and/or other conditions as covered under the Equality Act (i.e. sight impaired, deaf, neurodiverse conditions etc.).
- API
- Yes
- What users can and can't do using the API
- The Account Management Team will fully scope and determine all Customer and system needs for API integration, and which will be formally designed and planned within project and implementation plans. APIs enable the transfer of information and/or data, including updates, using one or two-way flows and between one or more systems, including third-party systems.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Large parts and functions of our system can be customised to a Customer/users needs, from data flows and automations within the system to data dashboards, reporting suites and analytics etc. For this, a dedicated Account Team is allocated to the Customer and who scope all needs and requirements, include bespoke preferences for customisation of services and solutions, and which is then designed within project ad implementation plans, including all testing to ensure customisations meet Customer requirements and expectations; and with continual reviews quarterly and annual to assure continuing suitability including annual improvement and development planning (generally and customer specific).
Scaling
- Independence of resources
- Each Customer will have their own dedicated Account Management and Technical Team, so demand from other customers/clients for our services will not effect the Customer or Customer users, and the level of support offered will remain consistent throughout the contract/service duration period and as agreed with the Customer during implementation and/or post-stage review meetings. Our Technical Team provide 24/7 support, constantly monitoring the system, and immediately report to us any concerns so we have time to react and can proactively manage issues.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
• CPU
• HTTP request and response status
• Memory
• Network
• Number of active instances - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can directly access, download and export all relevant data as per their user access level/permissions and on a self-access and self-use basis via the enhanced reporting and insights functionalities of the system - this which enables users to create, save and run bespoke/defined reports (and by selecting any/all data fields within the system) and as per the time-period defined by the user (i.e. adding start/end dates); and in user frendly/accessible formats (i.e. CSV/excel/PDF etc.)
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We have 99.9% up time availability in all of our SLA's.
- Approach to resilience
- This Document is available on request as it is more than 200 words.
- Outage reporting
- All outages will be reported by the Technical Team via phone, and followed by email to confirm the verbal report provided (including date/time).
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- All restrictions are scoped out in the implementation stage by our Tech and account team, all user permissions are set and all individual users have their own log ins.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR Ltd
- ISO/IEC 27001 accreditation date
- 11/04/2013
- What the ISO/IEC 27001 doesn’t cover
-
A.14.2.7 Outsourced Development
A.14.2.5 Secure system engineering principles - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Security Metrics
- PCI DSS accreditation date
- 11/05/2023
- What the PCI DSS doesn’t cover
- There are no exclusions - everything is covered.
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 22301 Business Continuity & Management
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We are ISO 27001 accredited and as such adhere and follow all standards, policies, processes and protocols for information security, integrity & confidentiality. Equally, we are also Cyber Essentials and PCI Certificated, further assuring of the level and robustness of existing policy/process application. Evidence of compliance/adherence can be evidenced via independent/external audits by ISO awarding body since. 2013 to date.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Configuration Management Database (CMDB) is maintained through a combined process of automated and manual discoveries, ongoing monitoring, and updates, change management and physical validation by asset protection. Items within the CMDB are automatically linked to the Support Team ticketing system, which allows for granularity in the identification of assets which may be subject to change, incidents, problems, or service requests. Management of assets is evidenced during external assessments of our ISO20000 and ISO27001 certifications, undertaken by Lloyd's Register (LR). ISO20000.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Vulnerability management activities are developed and implemented in accordance with established standards: ISO20000 for IT Service Management, and ISO27001 for Information Security Management. Both standards are regularly validated by external assessors.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our Technical Team undertakes such assessments daily, proposing and progressing actions necessary to ensure that vulnerabilities are not permitted to affect the service. Our Team ensures that records are maintained for vulnerabilities which have been fully addressed and those which remain outstanding pending the release of an appropriate solution from the client. Fixes to address new identified and evolving vulnerabilities takes place daily. After evaluation of the proposed deployment and design of the platforms, majority of vulnerabilities are mitigated without any risk to environments. Where vulnerabilities identified which require immediate action, clients will be informed.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We have formal policies and segregated protocols for ISMS and Cyber Security incidents/alerts , including specific activities for identifying, remediating, and resolving security incidents. Evidence of this is provided during external ISO 20000 and ISO27001 audits for annual certification, and assessed and validated by an accreditor from the National Cyber Security Centre.
Any security incident detected via Protective Monitoring is investigated. Where appropriate, incidents are escalated to the Focused Incident Response Security Team. They are responsible for assessing the impact and ensuring correct actions are taken to contain and resolve the incident as swiftly as possible.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
We hold ISO14001 Environmental Management accreditation and commit to minimising the environmental impact of our operations and carbon footprint via developing an ethos for environmental responsibility and programs for improvement. We demonstrate our commitment by implementing:
• Learning programmes to upskill staff/increase knowledge to reinvest into contracts/service delivery and for relay to Customers/contracted workforces, including regular communication and promotion (via websites/social-media/blogs/feeds) of environmental practices, with tips/techniques/prompts to encourage others and self-sufficiency at home/work, i.e. we use air-purifying plants across all offices, and in one office a ‘Lettuce Wall’ where varieties of lettuce grow from the inside wall and which are free for staff/visitors etc.
• Extensive recycling schemes for all paper/card/plastic/glass and laptops/computer equipment/mobile/e-devices to WEE directives
• Green Policies to reduce CO2 by utilising environmentally friendly equipment/systems/vehicles (i.e. low energy/power saving laptops/printers/phone systems and sensor/automatic lighting/pneumatic taps), adopting public transport first policies, and promoting shared transport-to-work (i.e. car sharing/walk-to-work/cycle-to-work schemes).
• Flexible and remote/home working to reduce travel/transport/energy impacts/emissions
• New and smart technologies to better monitor, support and improve our existing environmental programs/initiatives and further reducing the impact of our activities on the environment
• Digitalisation of all paperwork/records/documentation to reduce use of paper.
• Annual business-impact-assessments to assess, and further reduce, impacts of activities/operations on land/water/air/visual/noise pollution and resource consumption.Wellbeing
As an experienced provider of expert technology and workforce solutions, we are committed to supporting and promoting health/wellbeing through the following measures:
• Annual plans which organise/provide schedules of health/well-being communications/actions/activities, aligned to Our Health Plan and Mental Health at Work/Thriving at Work Standards. Informed by data/intelligence/research, best practice/innovation, workforce/stakeholder surveys, and includes monitoring/measuring targets/techniques to analyse impacts/improvements.
• Monthly e-Health calendars to relay actions/activities/support available, and promoting local/regional/national programs (i.e. dry January, brew Monday, cervical cancer/men’s health/stress awareness/love your lungs weeks, time-to-talk/world hearing/smoking cessation/cycle-to-work days etc.).
• Prioritise health/well-being/plans by communicating commitments from the top-down, enforced via senior ownership/accountability, with governance structures and review committees (to review/enhance/improve measures).
• Monitor health/wellbeing of whole-workforce using data capture/surveys/occupational health (anonymous)/absence data/return to work results and reason coding to identify negative/positive changes and effects/impacts.
• Think-tanks whereby stakeholders suggest improvements/changes across any area/department/business/operational function.
• Operate workplaces/cultures which consistently promote/offer healthy and good physical conditions, this includes:
o Using induction/supervision/review/appraisal processes which facilitate/enforce two-way conversations re: health/wellbeing/MH
o Visual cues encouraging people to stay active/connected/eat-well/healthily, i.e. posters re: sports participation/sponsorship or health-benefits using stairs not lifts (i.e. calories burned) and reminders at drink/vending machines to stay hydrated/positioning healthy snacks at eye level, organising walking lunches/breaks/meetings.
Pricing
- Price
- £1.00 to £10.00 a unit
- Discount for educational organisations
- No
- Free trial available
- No